ARTICLES

The Transforming Phase of a CRO

As the concept of cyber risk management continues to gain traction among regulators and financial institutions, the role of the CROs have transformed radically....

IoT Botnet Threat Mitigation

With the rise IoT Botnet attacks, it’s crucial to know about them and mitigate the threat they pose to enterprises. Let's have a look...

How Blockchain Can Enhance Data Security

Securing online transactions is a huge challenge for everyone. Data security is not an secondary option and hence Blockchain technology is an essential process....

CISOs and The Evolving Responsibility of Data Privacy

The data breach of Facebook users by Cambridge Analytica, have once again highlighted the ethical use of data. In this context, let's understand how...

NEWS

Dynamic Yield Deploys Software Defined Perimeter for Secure Network Access

Developer of AI-Powered Omnichannel Personalization Engine Selects Meta Networks to Enable Experience Delivery for Brands Meta Networks Ltd., the technology provider in software defined perimeter...

Adobe Patches 11 Flaws Across Four Products

Source: SW | By Eduard Kovacs The Patch Tuesday updates released by Adobe for August 2018 address nearly a dozen vulnerabilities in Flash Player, the...

New Check Point Research Reveals How Criminals Can Target Company &...

Faxploit: New Check Point Research Reveals How Criminals Can Target Company & Private Fax Machines to Take Over Networks and Spread Malware Newly discovered vulnerabilities,...

Cryptojacking is still “a bit of a black box” for 71%...

Source: CI | By Ana Balashova While cryptojacking is a newer trend in cybercrime, Chief Information Security Officers (CISOs) have struggled to adequately identify and...

INTERVIEWS

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

Interview with Sharad Sadadekar, CISO, HDFC Life Insurance

With the growing threat landscape in cyber space, how HDFC Life Insurance has been managing to protect their business sensitive data? Financial organisations are entrusted...

Keyur Desai, CIO – ESSAR Ports & Shipping, says that user...

With the growing threat landscape in cyber space, how Essar has been managing to protect their business sensitive data? While the threat landscape has been...

INDUSTRY INPUTS

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...